Cloud Infographic: Most Used Cloud Apps

Cloud Infographic: Most Used Cloud Apps

Most Used Cloud Apps  Cloud app and analytics company, Netskope released its quarterly Cloud Report. The new report reveals that enterprise employees are using an average of 397 different cloud apps (most of which are unsanctioned), when IT estimated they have 40-50 — that’s a tenfold underestimation. Below is an infographic provided courtesy of the group at Netskope which…

Zenoss Cloud Monitoring Wins Virtualization Review Reader’s Choice Award

Zenoss Cloud Monitoring Wins Virtualization Review Reader’s Choice Award

AUSTIN, TX–(Marketwired – Jan 28, 2014) – Zenoss Inc., the leading provider of unified IT monitoring and management solutions for physical, virtual, and cloud-based IT, today announced that Zenoss’ comprehensive cloud monitoring solution, Zenoss Service Dynamics, is an Editor’s Choice recipient in the 2014 Virtualization Review Reader’s Choice Awards.Virtualization Review is the first and only print publication solely devoted to…

Cloud Infographic: Personal Data Security

Cloud Infographic: Personal Data Security

Recently, Dashlane released a report that analyzed the password policies of the top 100 e-commerce sites. The results of this report are staggering. They demonstrate that the majority of the top e-commerce sites fail to comply with the recommended password security principles. In their infographic titled “The Illusion of Personal Data Security in E-commerce”, they…

Angry Birds And The NSA

Angry Birds And The NSA

The National Security Agency and British Government Communications Headquarters have been working together since 2007 to plant surveillance into mobile phone users’ applications, allowing them to store location information, alongside a slew of other private information users put into applications.   Popular app Angry Birds was targeted, alongside more common information hotspots like Facebook, LinkedIn…

Improving Product Quality Through The Cloud

Improving Product Quality Through The Cloud

Maintaining product quality is an amiable goal to have. It is, however, easier said than done. It’s likely that if you do have to maintain documentable quality standards, you are working in a government regulated industry rife with rules, procedures, and regular audits. Because of this, you’ll find that in order to main quality standards,…

21st Century Cybercrime – The Evolution Of Protecting Your Data

“21st Century Cybercrime – The Evolution of Protecting Your Data” The relentless development of technology has facilitated an increase in cybercrime, affecting individuals and businesses in different ways and to differing degrees. Since the advent of the internet the protection of data has been of paramount importance, however, the development of various technologies has made the…

Cloud Computing Round-Up Week 19th-26th Of Jan, 2014

Cloud Computing Round-Up Week 19th-26th Of Jan, 2014

Cloud Computing Round-Up Week 19th-26th of Jan, 2014 Here’s a round-up of the 3 top cloud stories making the headlines this week. Microsoft To Store Foreign Users’ Data Overseas – As the NSA gets grabby with users’ data, when those users happen to be using US based computing services, Microsoft have made a controversial move to…

Cloud Infographic: Going To The Cloud

Cloud Infographic: Going To The Cloud

Cloud Infographic: Going To The Cloud Over the past few years, we’ve covered the importance of cloud computing in the classroom and its defining nature as something to adopt and accept moving forward. Some of our coverage has been flippant while other discussions have been more serious in nature. Nevertheless we can all agree that cloud based education will…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Speed, flexibility, and innovation require multiple cloud services As businesses seek new paths to innovation, racing to market with new features and products, cloud services continue to grow in popularity. According to Gartner, 88% of total compute will be cloud-based by 2020, leaving just 12% on premise. Flexibility remains a key consideration, and…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence All businesses need a strategy and processes for governance, risk and compliance (GRC). Many still view GRC activity as a burdensome ‘must-do,’ approaching it reactively and managing it with non-specialized tools. GRC is a necessary business endeavor but it can be elevated from a cost drain to a value-add activity. By integrating…